Professional Documents
Culture Documents
Palmprint Verification
for Controlling Access
to Shared Computing
Resources
You can build an effective palmprint verification system using a
combination of mostly off-the-shelf components and techniques.
A
ccess security is an important aspect We’ve developed an effective prototype palm-
of pervasive computing systems. It print verification system using a combination of
offers the system developer and end mostly off-the-shelf (and therefore tried and
users a certain degree of trust in the tested) components and techniques. Such an
use of shared computing resources. approach should make palmprint verification an
Biometrics verification offers many advantages appealing proposition.
over the username-plus-password approach for
access control. Users don’t have to memorize any Palmprint verification
codes or passwords, and biometric systems are Figure 1 shows the system overview. The sys-
more reliable because biometric characteristics tem verifies palmprints in four stages: image
can’t easily be duplicated, lost, or stolen. acquisition, palm positioning, feature extraction,
Researchers have studied such biometric char- and palmprint matching.
acteristics as faces, fingerprints, irises, voices, and
palmprints.1 Facial appearance Image acquisition
and features change with age. During image acquisition, the system captures
Maylor K.H. Leung, A.C.M. Fong, Fingerprints can be affected by an image of the user’s hand via a camera and
and Siu Cheung Hui surface abrasions or otherwise stores it as a grayscale TIFF file. We use a general-
Nanyang Technological University compromised.2,3 Capturing iris purpose digital camera (a Pulnix America TMC-
images is relatively difficult, and 6). The image quality is acceptable for palmprint
iris scans can be intrusive. verification, assuming that the background is
Voices are susceptible to noise corruption and can illuminated uniformly. This is reasonable, given
be easily copied and manipulated. Palmprints are that lighting variations within such a small area
potentially a good choice for biometric applica- as a palm can be minimized.
tions because they’re invariant with a person, easy
to capture, and difficult to duplicate. They offer Palm positioning
greater security than fingerprints because palm Normally, in the raw image, the palm’s loca-
veins are more complex than finger veins. How- tion and orientation aren’t fixed. To solve this
ever, compared to other biometric characteristics, problem, the system must establish a coordinate
they have perhaps seen less research (see the side- system so that all the palms are properly aligned
bar on page 43 for more on palmprint biomet- and normalized. Another problem is that the
rics). This provides a big opportunity for advanc- raw image consists of the palm, fingers, wrist,
ing palmprint technology and applications. and some background. The system must trim
40 PERVASIVE computing Published by the IEEE Computer Society ■ 1536-1268/07/$25.00 © 2007 IEEE
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on August 05,2010 at 02:42:32 UTC from IEEE Xplore. Restrictions apply.
Figure 1. The palmprint verification
system.
Image acquisition
In step 1, the system performs convo- binary image isn’t immediately suitable helps to extract the feature points more
lution of the raw image (see figure 2a) for extracting feature points. The system efficiently.
with the Sobel kernels for each pixel. first passes it to the edge-thinning sub-
This step selects each pixel’s strongest stage to produce a refined edge image, to Feature-point location. To set up the co-
response to the four different masks to facilitate boundary tracing. ordinate system, we require the locations
represent that pixel’s gradient magni- For edge thinning, a morphological- of three feature points. These key points
tude. Step 2 uses adaptive thresholding thinning algorithm4 removes selected lie on the bottom of valleys between fin-
based on the computed gradient magni- pixels from the binary image to reduce gers. By observing the boundary image’s
tudes. First, we omit 5 percent of the all lines in the image to a single pixel line pattern, we see that the bottom of a
highest computed gradient magnitudes width. We calculate the thinned image valley is a short curve joining the edges of
to avoid biasing by outlier values. Sec- by first translating the structuring ele- adjacent fingers. The key points are best
ond, for the remaining gradient magni- ment’s origin to each possible pixel posi- represented as those curves’ midpoints.
tudes, using the highest value as refer- tion in the original image. (A structuring To locate the midpoint, one method is
ence Gr, we compute the threshold value element defines the shape and form of to first find the line (Lm) dividing the
as T_Gradient = Gr Ratio_Gradient, morphological operations.) We then interfinger space into halves. The inter-
where Ratio_Gradient is a predeter- compare the structuring element’s pixel section point between Lm and the bot-
mined constant between 0 and 1. We set pattern with the underlying part of the tom curve of the valley is one of the
Ratio_Gradient at 0.3. This relatively image. At each position, if the pixel pat- desired key points. Usually, the edges of
low value avoids broken edges. terns match, the image pixel underneath two adjacent fingers form a V-shape. We
With this approach, the threshold the structuring element’s origin is set as can establish an angle by extending the
value will be low if the input image’s edge background. In other words, we remove V-shaped edges until they intersect. To
response is weak, or it will be high if the a redundant foreground pixel. If the struc- find Lm, we calculate this angle’s bisec-
edge response is strong. After the system turing element’s pixel pattern doesn’t tor. Figure 2c illustrates this method.
computes the threshold value, it maps the match, the corresponding pixel remains Generally, directly locating the V-shaped
input image into a binary image, with unchanged. The thinned-edge image (see edges isn’t easy. To solve this problem, we
white pixels representing the edges and figure 2b) makes the analysis of bound- first find each finger’s parallel edges. Then,
black pixels representing the rest. The ary information much easier, which for every two adjacent fingers, we select
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on August 05,2010 at 02:42:32 UTC from IEEE Xplore. Restrictions apply.
SECURITY & PRIVACY
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on August 05,2010 at 02:42:32 UTC from IEEE Xplore. Restrictions apply.
Related Work in Palmprint Biometrics
creases are less optically identifiable, crease extraction requires scan- 7. “Fujitsu Announces Global Launch of Its Contactless Palm Vein Authen-
ning a piece of paper with an ink palmprint. This requirement limits tication Technology,” press release, Fujitsu Corp., 30 June 2005; www.
this method’s practical application. fujitsu.com/global/news/pr/archives/month/2005/20050630-01.html.
These studies have shown positive results for using palmprints 8. L. Sherriff, “Japanese Banks Deploy Biometric Palm Scanners,” The Regis-
as biometric features for personal identification. Most of these ter, 27 Aug. 2004, www.theregister.co.uk/2004/08/27/palm_biometrics.
Line detection. We use suitable line detec- plied the standard Sobel edge detector Image thresholding. After line detection,
tion masks for line extraction. Any stan- and thresholding on edge magnitude. each pixel’s value represents the strength
dard technique, such as Sobel or Canny This step produces an image such as in of its response to convolution of the image
edge detection, will serve. For this itera- figure 3. Other standard edge detectors with the masks. We use image threshold-
tion of our implementation, we’ve ap- should give similar results. ing to convert the 8-bit image into a
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on August 05,2010 at 02:42:32 UTC from IEEE Xplore. Restrictions apply.
SECURITY & PRIVACY
Palmprint matching
Figure 5. The results of (a) thinning and (b) straight-line approximation. The feature extraction stage passes the
information of the extracted line seg-
ments to the palmprint-matching stage.
binary image, with white representing must appear in both images, or the match- This stage’s main task is to measure the
pixels on the lines, and black otherwise. ing result might not be accurate. dissimilarity between the sets of line seg-
The number of extracted lines depends Images captured in different lighting ments extracted from different images.
on the threshold value. With a high environments have a different strength To do this, we apply the line segment
threshold, only those pixels that respond of response to the line detection masks. Hausdorff distance (LHD).6
strongly to line detection will remain, so So, using a fixed threshold, or a per-
the number of extracted lines will be centage of the strongest response value Line segment Hausdorff distance. The
small. With a low threshold, we can ex- as a threshold, doesn’t guarantee that the original Hausdorff distance is a shape
tract more lines, because the weaker ones system will extract the same number of comparison metric based on binary
are also included. Palmprint matching is lines from the different images. images.7 To measure dissimilarity, the
based on comparing the line segments of A better approach is to calculate the LHD also considers line orientation and
two images. The same number of lines threshold value on the basis of a per- line-point association. A number of ap-
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on August 05,2010 at 02:42:32 UTC from IEEE Xplore. Restrictions apply.
Figure 6. The parallel-displacement
m
measure.
plications, such as face recognition and testing image. If the testing image is close t
logo recognition, employ the LHD.6,8 to the model, the value will be small; oth-
Unlike shape comparison methods that erwise, it will be large. We base the veri- l ||1 l ||2
build a one-to-one correspondence be- fication decision on the matching score, d | | (m, t ) = min(l | | 1 , l | | 2 )
tween a model and a test image, the LHD using one of two methods.
can be calculated without explicit line The first method uses a fixed threshold
correspondence, to deal with the broken value. We perform LHD matching be- els in a database. The verification speed
lines due to segmentation errors.8 tween the testing image and the model depends on the database size. This
The LHD is based on the distance (d(m, with the desired user ID. If the matching method is slower than the first but can
t)) between two line segments m and t: score is below the threshold value, we be more accurate. To obtain 100 per-
consider the two palmprints to be from cent accuracy, the first method requires
d ( m, t ) = the same person. that all intrapalm matching scores are
Or, for a single testing image, we per- lower than all interpalm matching
Wa2 × dθ2 ( m, t ) + d2 ( m, t ) + d⊥2 ( m, t ) form LHD matching on all models in scores. The second method requires only
the database and select the model with that for each testing image, its intrapalm
where d(m, t) is the angle distance repre- the smallest matching score. If the user- matching score is lower than its inter-
sented by the tangent function with respect presented ID is the same as the selected palm matching scores. However, a test-
to the smallest angle between m and t. Wa model’s user ID, the system accepts the ing image’s intrapalm matching score
is the predetermined weight of angle dis- user. can be higher than another testing
tance. d||(m, t) is the parallel displace- The first method is simple and effi- image’s interpalm matching scores. If
ment—that is, the minimum displacement cient, because it performs LHD match- the ideal threshold value doesn’t exist,
to align either the left end points or the ing only once on two images. However, this method might still generate a per-
right end points of m and t (see figure 6). the decision’s accuracy depends on the fect result because it doesn’t depend on
d is the perpendicular displacement— threshold value. If the threshold value is a global threshold value.
that is, the distance between the two lines. too low, the false-rejection ratio will be The choice of method depends on the
Before computing the distance, we rotate high; if the threshold value is too high, system specification. If the database is
the shorter line around its center until the the false-acceptance ratio will be high. large, the first method is preferable. If
two lines become parallel. We can select a suitable threshold value the database is small or the system’s exe-
We define the directed LHD (hs) and based on the results of testing samples. cution time isn’t crucial, the second
undirected LHD (Hs) between two sets The ideal threshold value lies above the method can be considered.
of line segments M and T as global maximum intrapalm (matching the
palms of the same person) distance and Experimental results
hs ( M, T ) = below the minimum interpalm (matching We implemented our prototype using
( )
1 the palms of different persons) distance. Microsoft Visual C++ 6.0. To test the sys-
∑ lmi × min d mi , t j
∑ lmi mi∈M tj∈T Such a threshold value would produce tem’s performance, we captured 90 palm-
mi∈M 100 percent verification accuracy. How- print images—three images each from 30
ever, knowing these distances’ values is persons. We randomly selected one of the
H s ( M, T ) = impossible because we can collect only a three images to set up the database, so the
(
max hs ( M, T ) , hs (T , M ) ) limited number of samples for testing,
which produce only the local minimum
database contained 30 models. We used
the remaining 60 images as testing images
and local maximum. In addition, such an to match against the models. So, testing
where lmi is the length of line segment mi. ideal threshold value might not even exist involved 1,800 matching operations. Each
Hs represents the degree of dissimilarity if the global maximum intrapalm distance sample image was 380 285 pixels.
between the two sets of line segments. is larger than the minimum interpalm dis-
tance. In this case, verification won’t be Performance analysis
Decision making. LHD matching pro- 100 percent accurate. The system successfully detected the
duces a value (a matching score) repre- The second method is similar to a key points for all 90 images and correctly
senting the degree of dissimilarity be- recognition method, which generally re- cut out the subimages. It then compared
tween the model in the database and the quires matching operations on all mod- the line segments extracted from the
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on August 05,2010 at 02:42:32 UTC from IEEE Xplore. Restrictions apply.
SECURITY & PRIVACY
12
11
10
9
Matching score
8.91
8.22
8
5
Minimum interpalm distance
Intrapalm distance
4
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 43 45 47 49 51 53 55 57 59
Test image ID
testing images with those of the models. cribed in the section “Decision making”) considered the 20 images independently
Figure 7 shows the matching scores. produced 100 percent accurate identifi- of each other. These images corresponded
The system matched each testing image cation because for each testing image, to 20 individuals attempting to access a
against the 30 models in the database, the intrapalm distance was smaller than computer system. So, we considered the
including one intrapalm-matching model the corresponding minimum interpalm 20 images to be 20 “registered users,” each
and 29 interpalm-matching models. The distance. The average interpalm distance with his or her own computer account.
upper curve in figure 7 shows the mini- was 10.1, which is approximately twice Each registered user then attempted to
mum interpalm matching score for each the average intrapalm distance (5.9). access all 20 computer accounts in round-
testing image; the lower curve shows the These results show that the LHD can robin fashion. This entailed 400 tests, of
intrapalm matching scores. The upper effectively distinguish between interpalm which 20 should successfully gain access
curve’s lowest value (8.91) is greater than matches and intrapalm matches. and the rest should be denied.
the lower curve’s highest value (8.22), Using this procedure, we determined the
which means that all intrapalm matching Comparison with fingerprint FR and FA rates. Because a trade-off exists
scores are lower than the interpalm match- technology between FR and FA,1,11 we quote the
ing scores. For the sample testing images, To gauge our approach’s effectiveness, ranges of their values as follows. In our
100 percent accurate identification is pos- we performed additional tests to com- tests, FR ranged from 0 to 3.5 percent and
sible if the threshold value is between the pare it with fingerprint authentication. FA ranged from 0 to 0.5 percent. These
two boundary points. However, the dis- We chose fingerprint recognition be- values compare favorably against known
tance between those points is small, and cause it’s the most mature and produces data from fingerprint technology.9,11
selecting a suitable threshold isn’t easy in false-rejection (FR) and false-acceptance
practice. So, in general, using a predeter- (FA) rates that compare favorably to
A
mined threshold value to make verifica- those of techniques such as voice and s our experiments showed, the
tion decisions might generate errors. face recognition.9 system works well on images
We don’t report the accuracy of veri- Our procedure essentially followed two with a uniform background.
fication using a threshold value here previous approaches.9,10 First, we cap- We can further extended this
because it depends on the selected value. tured two palmprints each from 10 users, system to handle images with arbitrary
The second verification method (des- giving 20 different palmprint images. We backgrounds, because the algorithm for
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on August 05,2010 at 02:42:32 UTC from IEEE Xplore. Restrictions apply.
the AUTHORS
Maylor K.H. Leung is an associate professor in Nanyang Technological University’s School of Computer
Engineering. His research interests include computer vision, pattern recognition, and image processing,
with current focuses on video surveillance, face recognition, and shape indexing. He received his PhD
in computer science from the University of Saskatchewan. Contact him at Blk. N4, #2A-32, School of
locating and aligning the palmprint is Computer Eng., Nanyang Technological Univ., Singapore 639798; asmkleung@
based on line detection instead of simple ntu.edu.sg.
segmentation. This can make the system
A.C.M. Fong is an associate professor in computing systems at Nanyang Technological University’s
more robust and suitable for security School of Computer Engineering. His research interests include the Internet and multimedia, as well as
applications with outdoor cameras. digital communications and software engineering. He received his PhD in electrical and electronic engi-
neering from the University of Auckland. Contact him at Blk. N4, #2A-32, School of Computer Eng.,
Nanyang Technological Univ., Singapore 639798; acmfong@gmail.com.
Siu Cheung Hui is an associate professor in the Division of Information Systems at Nanyang Technolo-
REFERENCES gical University’s School of Computer Engineering. His research interests include data mining, Web
mining, the Semantic Web, intelligent systems, information retrieval, intelligent tutoring systems, and
1. Y. Gao, S.C. Hui, and A.C.M. Fong, “A timetabling and scheduling. He received his D.Phil. in computer science from the University of Sussex.
MultiView Facial Analysis Technique for Contact him at Blk. N4, #2A-32, School of Computer Eng., Nanyang Technological Univ., Singapore
Identity Authentication,” IEEE Pervasive 639798; asschui@ntu.edu.sg.
Computing, vol. 2, no. 1, 2003, pp. 38–45.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR. Downloaded on August 05,2010 at 02:42:32 UTC from IEEE Xplore. Restrictions apply.